General

  • Target

    laserexec.exe

  • Size

    23.9MB

  • Sample

    240829-hmxkcaycje

  • MD5

    4e3076bb3e8c80a68f5da909ca87582a

  • SHA1

    c25a103245c2a57e11f61ed367f159b92a1305f6

  • SHA256

    9483cce03342226bbbcbfc5063b5ef380eced3ee7f279bdcd0eb494ad45b6f4c

  • SHA512

    9b03c010fe857b760364a1136f8187f2b407b58dbecc863146411f93e282904d78cb46fc0d3ac5b426a7481ff323a6b1457607370c283d5aa2fee1bee114013b

  • SSDEEP

    393216:Ro9DM45CSuxfDhQtSJurEUWj5EnBSVkRIrY87FNYCEhM1tvZOiCUq1oFRNhRWd:m9N0SuNAYdbQzcY87Fjh1xZOL/67od

Malware Config

Targets

    • Target

      laserexec.exe

    • Size

      23.9MB

    • MD5

      4e3076bb3e8c80a68f5da909ca87582a

    • SHA1

      c25a103245c2a57e11f61ed367f159b92a1305f6

    • SHA256

      9483cce03342226bbbcbfc5063b5ef380eced3ee7f279bdcd0eb494ad45b6f4c

    • SHA512

      9b03c010fe857b760364a1136f8187f2b407b58dbecc863146411f93e282904d78cb46fc0d3ac5b426a7481ff323a6b1457607370c283d5aa2fee1bee114013b

    • SSDEEP

      393216:Ro9DM45CSuxfDhQtSJurEUWj5EnBSVkRIrY87FNYCEhM1tvZOiCUq1oFRNhRWd:m9N0SuNAYdbQzcY87Fjh1xZOL/67od

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks